The Internal and External Algebraic Structure. of Complexity Classes. Lance Fortnow. Department of Computer Science. The University of Chicago

Size: px
Start display at page:

Download "The Internal and External Algebraic Structure. of Complexity Classes. Lance Fortnow. Department of Computer Science. The University of Chicago"

Transcription

1 The Internal and External Algebraic Structure of Complexity Classes Lance Fortnow Department of Computer Science The University of Chicago 1100 East 58th Street Chicago, Illinois Abstract The report forms a bibliographic companion to a talk given at the Workshop on Algebraic Methods in Complexity Theory in Madras, India in December, In this report we will give many references that the reader may nd useful in studying the internal and external algebraic structure of complexity classes. 1 Introduction The external algebraic structure of a complexity class refers to algebraic closure properties that a class may possess such as the fact that #P functions are closed under addition and multiplication. The internal algebraic structure refers to how we can give alternate denitions of complexity classes based on building these classes from algebraic operations on top of very simple functions. For example #P functions in some sense look like low-degree polynomials over their inputs. This report will give a list of many references related to the internal and external algebraic structure of complexity classes. Please note that this report is in no sense complete and only meant as a place for interested researchers to nd some references in this area. 2 Study of Structure This section lists some papers that have studied algebraic structures of complexity classes in their own right. fortnow@cs.uchicago.edu. Partially supported by NSF grant CCR

2 Papers on Study of Structure [1] S. Arora, R. Impagliazzo, and U. Vazirani. Relativizing versus nonrelativizing techniques: The role of local checkability. Manuscript, University of California, Berkeley, [2] L. Babai and L. Fortnow. Arithmetization: A new method in structural complexity theory. Computational Complexity, 1(1):41{66, [3] S. Fenner, L. Fortnow, and S. Kurtz. Gap-denable counting classes. Journal of Computer and System Sciences, 48(1):116{148, [4] A. Razborov and S. Rudich. Natural proofs. In Proceedings of the 26th ACM Symposium on the Theory of Computing, pages 204{213. ACM, New York, External Structure In this section we list papers that prove theorems using the external structure of complexity theory. These theorems generally show that classes have certain closure properties based on their external algebraic structure. We feel that this study may prove more important as it may lead us to understand how to separate complexity classes. If two complexity classes do not have the same external algebraic structure then they cannot coincide. Papers Using External Structure [1] L. Babai and S. Moran. Arthur-Merlin games: a randomized proof system, and a hierarchy of complexity classes. Journal of Computer and System Sciences, 36(2):254{276, [2] R. Beigel and J. Gill. Counting classes: Thresholds, parity, mods, and fewness. Theoretical Computer Science, 103:3{23, [3] J. Cai, A. Condon, and R. Lipton. On bounded round multi-prover interactive proof systems. In Proceedings of the 5th IEEE Structure in Complexity Theory Conference, pages 45{54. IEEE, New York, [4] J. Cai, A. Condon, and R. Lipton. On games of incomplete information. Theoretical Computer Science, 103(1):25{38, [5] A. Condon and R. J. Lipton. On the complexity of space bounded interactive proofs. In Proceedings of the 30th IEEE Symposium on Foundations of Computer Science, pages 462{467. IEEE, New York, 1989.

3 [6] S. Goldwasser and M. Sipser. Private coins versus public coins in interactive proof systems. In S. Micali, editor, Randomness and Computation, volume 5 of Advances in Computing Research, pages 73{90. JAI Press, Greenwich, [7] U. Hertrampf. Relations among MOD classes (note). Theoretical Computer Science, 74:325{328, [8] R. Impagliazzo and D. Zuckerman. How to recycle random bits. In Proceedings of the 30th IEEE Symposium on Foundations of Computer Science, pages 248{253. IEEE, New York, [9] J. Kobler and U. Schoning and J. Toran. On counting and approximation. Acta Informatica, 26:363{379, [10] J. Kobler, U. Schoning, S. Toda, and J. Toran. Turing machines with few accepting computations and low sets for PP. Journal of Computer and System Sciences, 44(2):272{286, [11] J. Kobler, U. Schoning, and J. Toran. Graph isomorphism is low for PP. Computational Complexity, 2(4):301{330, [12] R. Mathon. A note on the graph isomorphism counting problem. Information Processing Letters, 8:131{132, [13] L. Valiant and V. Vazirani. NP is as easy as detecting unique solutions. Theoretical Computer Science, 47:85{93, Internal Structure In this section, we list papers that use the internal algebraic structure of complexity classes to prove theorems about these classes. By expressing a complexity class in terms of simple algebraic operations, we can often \simulate" that class using other means. Many important circuit complexity and interactive proof system results use this method. Papers Using Internal Structure [1] M. Abadi, J. Feigenbaum, and J. Kilian. On hiding information from an oracle. Journal of Computer and System Sciences, 39:21{50, [2] S. Arora, C. Lund, R. Motwani, M. Sudan, and M. Szegedy. Proof verication and hardness of approximation problems. In Proceedings of the 33rd IEEE Symposium on Foundations of Computer Science, pages 14{23. IEEE, New York, 1992.

4 [3] S. Arora and S. Safra. Probabilistic checking of proofs: A new characterization of NP. In Proceedings of the 33rd IEEE Symposium on Foundations of Computer Science, pages 2{13. IEEE, New York, [4] L. Babai, L. Fortnow, L. Levin, and M. Szegedy. Checking computations in polylogarithmic time. In Proceedings of the 23rd ACM Symposium on the Theory of Computing, pages 21{31. ACM, New York, [5] L. Babai, L. Fortnow, and C. Lund. Non-deterministic exponential time has two-prover interactive protocols. Computational Complexity, 1(1):3{ 40, [6] L. Babai, L. Fortnow, N. Nisan, and A. Wigderson. BPP has subexponential simulations unless EXPTIME has publishable proofs. In Proceedings of the 6th IEEE Structure in Complexity Theory Conference, pages 213{219. IEEE, New York, [7] D. Barrington. Bounded-width polynomial-size branching programs recognize exactly those languages in NC 1. Journal of Computer and System Sciences, 38(1):150{164, [8] D. Beaver and J. Feigenbaum. Hiding instances in multioracle queries. In Proceedings of the 7th Symposium on Theoretical Aspects of Computer Science, volume 415 of Lecture Notes in Computer Science, pages 37{48. Springer, Berlin, [9] D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway. Security with low communication overhead. In Advances in Cryptology { Crypto '90, volume 537 of Lecture Notes in Computer Science, pages 62{76. Springer, Berlin, [10] R. Beigel and J. Tarui. On ACC. In Proceedings of the 32nd IEEE Symposium on Foundations of Computer Science, pages 783{792. IEEE, [11] M. Blum, M. Luby, and R. Rubinfeld. Self-testing and self-correcting programs, with applications to numerical programs. Journal of Computer and System Sciences, 47:549{595, [12] D. Bovet, P. Crescenzi, and R. Silvestri. A uniform approach to dene complexity classes. Theoretical Computer Science, 104:263{283, [13] J. Cai and M. Furst. PSPACE survives constant-width bottlenecks. International Journal of Foundations of Computer Science, 2:67{76, [14] U. Feige, S. Goldwasser, L. Lovasz, S. Safra, and M. Szegedy. Approximating clique is almost NP-complete. In Proceedings of the 32nd IEEE

5 Symposium on Foundations of Computer Science, pages 2{12. IEEE, New York, [15] U. Feige and L. Lovasz. Two-prover one-round proof systems: Their power and their problems. In Proceedings of the 24th ACM Symposium on the Theory of Computing, pages 733{744. ACM, New York, [16] L. Fortnow and C. Lund. Interactive proof systems and alternating timespace complexity. Theoretical Computer Science A, 113:55{73, [17] N. Linial, Y. Mansour, and N. Nisan. Constant depth circuits, fourier transform, and learnability. Journal of the ACM, 40(3):607{620, [18] C. Lund, L. Fortnow, H. Karlo, and N. Nisan. Algebraic methods for interactive proof systems. Journal of the ACM, 39(4):859{868, [19] K. Mulmuley, U. Vazirani, and V. Vazirani. Matching is as easy as matrix inversion. Combinatorica, 7(1):105{113, [20] N. Nisan and M. Szegedy. On the degree of boolean functions as real polynomial. In Proceedings of the 24th ACM Symposium on the Theory of Computing, pages 462{467. ACM, New York, [21] N. Nisan and A. Wigderson. Hardness vs. randomness. In Proceedings of the 29th IEEE Symposium on Foundations of Computer Science, pages 2{11. IEEE, New York, [22] A. Razborov. Lower bounds of monotone complexity of the logical permanent function. Mathematical Notes of the Academy of Sciences of the USSR, 37:485{493, [23] A. Razborov. Lower bounds on the size of bounded depth circuits over a complete basis with logical addition. Mathematical Notes of the Academy of Sciences of the USSR, 41(4):333{338, [24] A. Razborov. Applications of matrix methods to the theory of lower bounds in computational complexity. Combinatorica, 10(1):81{93, [25] A. Shamir. IP = PSPACE. Journal of the ACM, 39(4):869{877, [26] A. Shen. IP = PSPACE: A simplied proof. Journal of the ACM, 39(4):878{880, 1992.

6 5 Internal and External Structure The papers that we nd most interesting use both the internal and external structure of complexity classes. These papers use the internal structure to \simulate" the classes and the external structure to keep these operations within the class. This section includes some of the most important results in complexity theory. Papers Using Both Internal and External Structure [1] E. Allender. A note on the power of threshold circuits. In Proceedings of the 30th IEEE Symposium on Foundations of Computer Science, pages 580{584. IEEE, New York, [2] R. Beigel. Perceptrons, PP and the polynomial hierarchy. In Proceedings of the 7th IEEE Structure in Complexity Theory Conference, pages 14{ 19. IEEE, New York, [3] R. Beigel, N. Reingold, and D. Spielman. The perceptron strikes back. In Proceedings of the 6th IEEE Structure in Complexity Theory Conference, pages 286{291. IEEE, New York, [4] R. Beigel, N. Reingold, and D. Spielman. PP is closed under intersection. Journal of Computer and System Sciences, To appear. Paper also appeared in Proceedings of 23rd STOC conference, 1991, pages 1-9. [5] D. Lapidot and A. Shamir. Fully parallelized multi prover protocols for NEXP-time. In Proceedings of the 32nd IEEE Symposium on Foundations of Computer Science, pages 13{18. IEEE, New York, [6] A. Razborov. Bounded Arithmetic and lower bounds in Boolean complexity. Feasible Mathematics II, To appear. [7] R. Smolensky. Algebraic methods in the theory of lower bounds for Boolean circuit complexity. In Proceedings of the 19th ACM Symposium on the Theory of Computing, pages 77{82. ACM, New York, [8] J. Tarui. Probabilistic polynomials, AC 0 functions and the polynomialtime hierarchy. Theoretical Computer Science A, 113:167{183, [9] S. Toda. PP is as hard as the polynomial-time hierarchy. SIAM Journal on Computing, 20(5):865{877, [10] S. Toda and M. Ogiwara. Counting classes are at least as hard as the polynomial-time hierarchy. SIAM Journal on Computing, 21(2):316{ 328, 1992.

7 [11] S. Toda and O. Watanabe. Polynomial time 1-turing reductions from #P H to #P. Theoretical Computer Science, page to appear, [12] L. Valiant. The complexity of computing the permanent. Theoretical Computer Science, 8:189{201, [13] A. Yao. On ACC and threshold circuits. In Proceedings of the 31st IEEE Symposium on Foundations of Computer Science, pages 619{631. IEEE, New York, 1990.

The Complexity of Approximating a Nonlinear Program

The Complexity of Approximating a Nonlinear Program The Complexity of Approximating a Nonlinear Program Mihir Bellare Phillip Rogaway October 1993 Abstract We consider the problem of finding the maximum of a multivariate polynomial inside a convex polytope.

More information

Linearity and Group Homomorphism Testing / Testing Hadamard Codes

Linearity and Group Homomorphism Testing / Testing Hadamard Codes Title: Linearity and Group Homomorphism Testing / Testing Hadamard Codes Name: Sofya Raskhodnikova 1, Ronitt Rubinfeld 2 Affil./Addr. 1: Pennsylvania State University Affil./Addr. 2: Keywords: SumOriWork:

More information

A Brief Introduction to Property Testing

A Brief Introduction to Property Testing A Brief Introduction to Property Testing Oded Goldreich Abstract. This short article provides a brief description of the main issues that underly the study of property testing. It is meant to serve as

More information

How to Prove a Theorem So No One Else Can Claim It

How to Prove a Theorem So No One Else Can Claim It Proceedings of the International Congress of Mathematicians Berkeley, California, USA, 1986 How to Prove a Theorem So No One Else Can Claim It MANUEL BLUM Goldwasser, Micali, and Rackoff [GMR] define for

More information

Lecture 2: Complexity Theory Review and Interactive Proofs

Lecture 2: Complexity Theory Review and Interactive Proofs 600.641 Special Topics in Theoretical Cryptography January 23, 2007 Lecture 2: Complexity Theory Review and Interactive Proofs Instructor: Susan Hohenberger Scribe: Karyn Benson 1 Introduction to Cryptography

More information

Succinct Proofs for NP and Spooky Interactions

Succinct Proofs for NP and Spooky Interactions Succinct Proofs for NP and Spooky Interactions Cynthia Dwork Michael Langberg Moni Naor Kobbi Nissim Omer Reingold December 21, 2004 Abstract This paper investigates the possibility that any NP statement

More information

Oracles Are Subtle But Not Malicious

Oracles Are Subtle But Not Malicious Oracles Are Subtle But Not Malicious Scott Aaronson University of Waterloo Abstract Theoretical computer scientists have been debating the role of oracles since the 1970 s. This paper illustrates both

More information

The Approximability of NP-hard Problems

The Approximability of NP-hard Problems The Approximability of NP-hard Problems Sanjeev Arora Princeton University 1 Introduction Many problems in combinatorial optimization are NP-hard (see [60]). This has forced researchers to explore techniques

More information

Lecture 7: NP-Complete Problems

Lecture 7: NP-Complete Problems IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Basic Course on Computational Complexity Lecture 7: NP-Complete Problems David Mix Barrington and Alexis Maciel July 25, 2000 1. Circuit

More information

Outline Introduction Circuits PRGs Uniform Derandomization Refs. Derandomization. A Basic Introduction. Antonis Antonopoulos.

Outline Introduction Circuits PRGs Uniform Derandomization Refs. Derandomization. A Basic Introduction. Antonis Antonopoulos. Derandomization A Basic Introduction Antonis Antonopoulos CoReLab Seminar National Technical University of Athens 21/3/2011 1 Introduction History & Frame Basic Results 2 Circuits Definitions Basic Properties

More information

Algebrization: A New Barrier in Complexity Theory

Algebrization: A New Barrier in Complexity Theory Algebrization: A New Barrier in Complexity Theory Scott Aaronson MIT Avi Wigderson Institute for Advanced Study Abstract Any proof of P NP will have to overcome two barriers: relativization and natural

More information

The Complexity of Testing Monomials in Multivariate Polynomials

The Complexity of Testing Monomials in Multivariate Polynomials Electronic Colloquium on Computational Complexity, Report No. 114 (2010) The Complexity of Testing Monomials in Multivariate Polynomials Zhixiang Chen and Bin Fu Department of Computer Science University

More information

THE P VERSUS NP PROBLEM

THE P VERSUS NP PROBLEM THE P VERSUS NP PROBLEM STEPHEN COOK 1. Statement of the Problem The P versus NP problem is to determine whether every language accepted by some nondeterministic algorithm in polynomial time is also accepted

More information

P versus NP, and More

P versus NP, and More 1 P versus NP, and More Great Ideas in Theoretical Computer Science Saarland University, Summer 2014 If you have tried to solve a crossword puzzle, you know that it is much harder to solve it than to verify

More information

Lecture 11: The Goldreich-Levin Theorem

Lecture 11: The Goldreich-Levin Theorem COM S 687 Introduction to Cryptography September 28, 2006 Lecture 11: The Goldreich-Levin Theorem Instructor: Rafael Pass Scribe: Krishnaprasad Vikram Hard-Core Bits Definition: A predicate b : {0, 1}

More information

Guaranteed Slowdown, Generalized Encryption Scheme, and Function Sharing

Guaranteed Slowdown, Generalized Encryption Scheme, and Function Sharing Guaranteed Slowdown, Generalized Encryption Scheme, and Function Sharing Yury Lifshits July 10, 2005 Abstract The goal of the paper is to construct mathematical abstractions of different aspects of real

More information

Quantum Computability and Complexity and the Limits of Quantum Computation

Quantum Computability and Complexity and the Limits of Quantum Computation Quantum Computability and Complexity and the Limits of Quantum Computation Eric Benjamin, Kenny Huang, Amir Kamil, Jimmy Kittiyachavalit University of California, Berkeley December 7, 2003 This paper will

More information

Relativized Separations of Worst-Case and Average-Case Complexities for NP

Relativized Separations of Worst-Case and Average-Case Complexities for NP 2011 26th Annual IEEE Conference on Computational Complexity Relativized Separations of Worst-Case and Average-Case Complexities for NP Russell Impagliazzo U. C. San Diego and IAS russell@cs.ucsd.edu Keywords-P

More information

Open Problems in Quantum Information Processing. John Watrous Department of Computer Science University of Calgary

Open Problems in Quantum Information Processing. John Watrous Department of Computer Science University of Calgary Open Problems in Quantum Information Processing John Watrous Department of Computer Science University of Calgary #1 Open Problem Find new quantum algorithms. Existing algorithms: Shor s Algorithm (+ extensions)

More information

Non-Black-Box Techniques In Crytpography. Thesis for the Ph.D degree Boaz Barak

Non-Black-Box Techniques In Crytpography. Thesis for the Ph.D degree Boaz Barak Non-Black-Box Techniques In Crytpography Introduction Thesis for the Ph.D degree Boaz Barak A computer program (or equivalently, an algorithm) is a list of symbols a finite string. When we interpret a

More information

2.1 Complexity Classes

2.1 Complexity Classes 15-859(M): Randomized Algorithms Lecturer: Shuchi Chawla Topic: Complexity classes, Identity checking Date: September 15, 2004 Scribe: Andrew Gilpin 2.1 Complexity Classes In this lecture we will look

More information

Revisiting a Limit on Efficient Quantum Computation

Revisiting a Limit on Efficient Quantum Computation Revisiting a Limit on Efficient Quantum Computation Tarsem S. Purewal Jr. Department of Computer Science University of Georgia Athens, GA 30602 purewal@cs.uga.edu ABSTRACT In this paper, we offer an exposition

More information

Combinatorial PCPs with ecient veriers

Combinatorial PCPs with ecient veriers Combinatorial PCPs with ecient veriers Or Meir Abstract The PCP theorem asserts the existence of proofs that can be veried by a verier that reads only a very small part of the proof. The theorem was originally

More information

Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs

Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs Stavros Athanassopoulos, Ioannis Caragiannis, and Christos Kaklamanis Research Academic Computer Technology Institute

More information

The Status of the P versus NP Problem

The Status of the P versus NP Problem The Status of the P versus NP Problem Lance Fortnow Northwestern University 1. INTRODUCTION When Moshe Vardi asked me to write this piece for CACM, my first reaction was the article could be written in

More information

Remarks on the computational complexity of small universal Turing machines

Remarks on the computational complexity of small universal Turing machines Remarks on the computational complexity of small universal Turing machines Damien Woods School of Mathematics Boole Centre for Research in Informatics, University College Cork, Ireland http://www.bcri.ucc.ie/

More information

How To Solve An Npa-Complete Problems With Quantum Computing And Chaotic Dynamics

How To Solve An Npa-Complete Problems With Quantum Computing And Chaotic Dynamics CDMTCS Research Report Series A New Quantum Algorithm for NP-complete Problems Masanori Ohya Igor V. Volovich Science University of Tokyo Steklov Mathematical Institute CDMTCS-194 September 00 Centre for

More information

Constant-Round Interactive Proofs for Delegating Computation

Constant-Round Interactive Proofs for Delegating Computation Electronic Colloquium on Computational Complexity, Report No. 61 2016 Constant-Round Interactive Proofs for Delegating Computation Omer Reingold Samsung Research America Guy N. Rothblum Samsung Research

More information

Computational complexity theory

Computational complexity theory Computational complexity theory Goal: A general theory of the resources needed to solve computational problems What types of resources? Time What types of computational problems? decision problem Decision

More information

Diagonalization. Ahto Buldas. Lecture 3 of Complexity Theory October 8, 2009. Slides based on S.Aurora, B.Barak. Complexity Theory: A Modern Approach.

Diagonalization. Ahto Buldas. Lecture 3 of Complexity Theory October 8, 2009. Slides based on S.Aurora, B.Barak. Complexity Theory: A Modern Approach. Diagonalization Slides based on S.Aurora, B.Barak. Complexity Theory: A Modern Approach. Ahto Buldas Ahto.Buldas@ut.ee Background One basic goal in complexity theory is to separate interesting complexity

More information

Factoring by Quantum Computers

Factoring by Quantum Computers Factoring by Quantum Computers Ragesh Jaiswal University of California, San Diego A Quantum computer is a device that uses uantum phenomenon to perform a computation. A classical system follows a single

More information

Beyond NP: The Work and Legacy of Larry Stockmeyer. Lance Fortnow University of Chicago

Beyond NP: The Work and Legacy of Larry Stockmeyer. Lance Fortnow University of Chicago Beyond NP: The Work and Legacy of Larry Stockmeyer Lance Fortnow University of Chicago Larry Joseh Stockmeyer 1948 Born in Indiana 1974 MIT Ph.D. IBM Research at Yorktown and Almaden for most of his career

More information

Which Problems Have Strongly Exponential Complexity? 1

Which Problems Have Strongly Exponential Complexity? 1 Journal of Computer and System Sciences 63, 512 530 (2001) doi:10.1006/jcss.2001.1774, available online at http://www.idealibrary.com on Which Problems Have Strongly Exponential Complexity? 1 Russell Impagliazzo

More information

Proof Systems that Take Advice

Proof Systems that Take Advice Proof Systems that Take Advice Olaf Beyersdorff 1, Johannes Köbler 2, and Sebastian Müller 2 1 Institut für Theoretische Informatik, Leibniz-Universität Hannover, Germany beyersdorff@thi.uni-hannover.de

More information

The Status of the P versus NP Problem

The Status of the P versus NP Problem doi:10.1145/ 1562164.1562186 It s one of the fundamental mathematical problems of our time, and its importance grows with the rise of powerful computers. By Lance Fortnow The Status of the P versus NP

More information

Exact Polynomial-time Algorithm for the Clique Problem and P = NP for Clique Problem

Exact Polynomial-time Algorithm for the Clique Problem and P = NP for Clique Problem xact Polynomial-time Algorithm for the Clique Problem and P = NP for Clique Problem Kanak Chandra Bora Department of Computer Science & ngineering Royal School of ngineering & Technology, Betkuchi, Guwahati-7810,

More information

2 Preliminaries. 2.1 Functions and polynomials. rank of the2n2ncommunication matrixmfdefined by Mf(x;y)=f(x;y). The following relations are known:

2 Preliminaries. 2.1 Functions and polynomials. rank of the2n2ncommunication matrixmfdefined by Mf(x;y)=f(x;y). The following relations are known: Characterization of Non-Deterministic Quantum Query and Quantum Communication Complexity Ronald de Wolf Centrum voor Wiskunde en Informatica (CWI) Kruislaan 413 1098 SJ Amsterdam, the Netherlands rdewolf@cwi.nl

More information

Complexity Classes P and NP

Complexity Classes P and NP Complexity Classes P and NP MATH 3220 Supplemental Presentation by John Aleshunas The cure for boredom is curiosity. There is no cure for curiosity Dorothy Parker Computational Complexity Theory In computer

More information

Experimental Analysis of Privacy-Preserving Statistics Computation

Experimental Analysis of Privacy-Preserving Statistics Computation Experimental Analysis of Privacy-Preserving Statistics Computation Hiranmayee Subramaniam 1, Rebecca N. Wright 2, and Zhiqiang Yang 2 1 Stevens Institute of Technology graduate, hiran@polypaths.com. 2

More information

Private Information Retrieval

Private Information Retrieval Private Information Retrieval Benny Chor Oded Goldreich Eyal Kushilevitz Madhu Sudan April 21, 1998 Abstract Publicly accessible databases are an indispensable resource for retrieving up to date information.

More information

Polynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range

Polynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range THEORY OF COMPUTING, Volume 1 (2005), pp. 37 46 http://theoryofcomputing.org Polynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range Andris Ambainis

More information

Lecture 4: AC 0 lower bounds and pseudorandomness

Lecture 4: AC 0 lower bounds and pseudorandomness Lecture 4: AC 0 lower bounds and pseudorandomness Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: Jason Perry and Brian Garnett In this lecture,

More information

Algebraic Computation Models. Algebraic Computation Models

Algebraic Computation Models. Algebraic Computation Models Algebraic Computation Models Ζυγομήτρος Ευάγγελος ΜΠΛΑ 201118 Φεβρουάριος, 2013 Reasons for using algebraic models of computation The Turing machine model captures computations on bits. Many algorithms

More information

On Rank vs. Communication Complexity

On Rank vs. Communication Complexity On Rank vs. Communication Complexity Noam Nisan Avi Wigderson Abstract This paper concerns the open problem of Lovász and Saks regarding the relationship between the communication complexity of a boolean

More information

SUBLIMINALFREE AUTHENTICATION AND SIGNATURE

SUBLIMINALFREE AUTHENTICATION AND SIGNATURE SUBLIMINALFREE AUTHENTICATION AND SIGNATURE (Extended Abstract) Yvo Desmedt Dept. EE & CS, Univ. of Wisconsin - Milwaukee P.O. Box 784, WI 53201 Milwaukee, U.S.A. ABSTRACT Simmons [17] introduced the notion

More information

Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring

Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Eli Biham Dan Boneh Omer Reingold Abstract The Diffie-Hellman key-exchange protocol may naturally be extended to k > 2

More information

A Working Knowledge of Computational Complexity for an Optimizer

A Working Knowledge of Computational Complexity for an Optimizer A Working Knowledge of Computational Complexity for an Optimizer ORF 363/COS 323 Instructor: Amir Ali Ahmadi TAs: Y. Chen, G. Hall, J. Ye Fall 2014 1 Why computational complexity? What is computational

More information

ETH Zurich. Email: stadler@inf.ethz.ch. participants such that only certain groups of them can recover it.

ETH Zurich. Email: stadler@inf.ethz.ch. participants such that only certain groups of them can recover it. Publicly Veriable Secret Sharing Markus Stadler? Institute for Theoretical Computer Science ETH Zurich CH-8092 Zurich, Switzerland Email: stadler@inf.ethz.ch Abstract. A secret sharing scheme allows to

More information

Hard Functions for Low-degree Polynomials over Prime Fields

Hard Functions for Low-degree Polynomials over Prime Fields 0 Hard Functions for Low-degree Polynomials over Prime Fields Andrej Bogdanov, Department of Computer Science and Engineering and Institute for Theoretical Computer Science and Communications, Chinese

More information

MATHEMATICS: CONCEPTS, AND FOUNDATIONS Vol. III - Logic and Computer Science - Phokion G. Kolaitis

MATHEMATICS: CONCEPTS, AND FOUNDATIONS Vol. III - Logic and Computer Science - Phokion G. Kolaitis LOGIC AND COMPUTER SCIENCE Phokion G. Kolaitis Computer Science Department, University of California, Santa Cruz, CA 95064, USA Keywords: algorithm, Armstrong s axioms, complete problem, complexity class,

More information

Some Optimal Inapproximability Results

Some Optimal Inapproximability Results Some Optimal Inapproximability Results JOHAN HÅSTAD Royal Institute of Technology, Stockholm, Sweden Abstract. We prove optimal, up to an arbitrary ɛ>0, inapproximability results for Max-Ek-Sat for k 3,

More information

A Secure Protocol for the Oblivious Transfer (Extended Abstract) M. J. Fischer. Yale University. S. Micali Massachusetts Institute of Technology

A Secure Protocol for the Oblivious Transfer (Extended Abstract) M. J. Fischer. Yale University. S. Micali Massachusetts Institute of Technology J, Cryptoiogy (1996) 9:191-195 Joumol of CRYPTOLOGY O 1996 International Association for Cryptologic Research A Secure Protocol for the Oblivious Transfer (Extended Abstract) M. J. Fischer Yale University

More information

Influences in low-degree polynomials

Influences in low-degree polynomials Influences in low-degree polynomials Artūrs Bačkurs December 12, 2012 1 Introduction In 3] it is conjectured that every bounded real polynomial has a highly influential variable The conjecture is known

More information

Complexity Theory. Jörg Kreiker. Summer term 2010. Chair for Theoretical Computer Science Prof. Esparza TU München

Complexity Theory. Jörg Kreiker. Summer term 2010. Chair for Theoretical Computer Science Prof. Esparza TU München Complexity Theory Jörg Kreiker Chair for Theoretical Computer Science Prof. Esparza TU München Summer term 2010 Lecture 8 PSPACE 3 Intro Agenda Wrap-up Ladner proof and time vs. space succinctness QBF

More information

Improved Online/Offline Signature Schemes

Improved Online/Offline Signature Schemes Improved Online/Offline Signature Schemes Adi Shamir and Yael Tauman Applied Math. Dept. The Weizmann Institute of Science Rehovot 76100, Israel {shamir,tauman}@wisdom.weizmann.ac.il Abstract. The notion

More information

The Parameterized Complexity of Short Computation and Factorization

The Parameterized Complexity of Short Computation and Factorization The Parameterized Complexity of Short Computation and Factorization Liming Cai and Jianer Chen Department of Computer Science, Texas A & M University College Station, Texas 77843 U.S.A. Rodney G. Downey

More information

Functions Computable with Nonadaptive Queries to NP Harry Buhrman CWI Amsterdam Jim Kadin y University ofmaine Thomas Thierauf z Universitat Ulm Abstract We study FP NP, the class of functions that can

More information

TR 98-032, Electronic Colloquium on Computational Complexity, June 1998. Uniform Generation of NP-witnesses using an NP-oracle Mihir Bellare æ Oded Goldreich y Erez Petrank z May 1998 Abstract A Uniform

More information

Chapter 1. NP Completeness I. 1.1. Introduction. By Sariel Har-Peled, December 30, 2014 1 Version: 1.05

Chapter 1. NP Completeness I. 1.1. Introduction. By Sariel Har-Peled, December 30, 2014 1 Version: 1.05 Chapter 1 NP Completeness I By Sariel Har-Peled, December 30, 2014 1 Version: 1.05 "Then you must begin a reading program immediately so that you man understand the crises of our age," Ignatius said solemnly.

More information

1 Formulating The Low Degree Testing Problem

1 Formulating The Low Degree Testing Problem 6.895 PCP and Hardness of Approximation MIT, Fall 2010 Lecture 5: Linearity Testing Lecturer: Dana Moshkovitz Scribe: Gregory Minton and Dana Moshkovitz In the last lecture, we proved a weak PCP Theorem,

More information

OHJ-2306 Introduction to Theoretical Computer Science, Fall 2012 8.11.2012

OHJ-2306 Introduction to Theoretical Computer Science, Fall 2012 8.11.2012 276 The P vs. NP problem is a major unsolved problem in computer science It is one of the seven Millennium Prize Problems selected by the Clay Mathematics Institute to carry a $ 1,000,000 prize for the

More information

Johan Håstad. December 2015

Johan Håstad. December 2015 Johan Håstad December 2015 1 Address School of Computer Science and Communication KTH Royal Institute of Technology 100 44 Stockholm, SWEDEN email:johanh@kth.se 2 Research Interests Theory of computation.

More information

Alternative machine models

Alternative machine models Alternative machine models Computational complexity thesis: All reasonable computer models can simulate one another in polynomial time (i.e. P is robust or machine independent ). But the Turing machine

More information

Introduction to Algorithms. Part 3: P, NP Hard Problems

Introduction to Algorithms. Part 3: P, NP Hard Problems Introduction to Algorithms Part 3: P, NP Hard Problems 1) Polynomial Time: P and NP 2) NP-Completeness 3) Dealing with Hard Problems 4) Lower Bounds 5) Books c Wayne Goddard, Clemson University, 2004 Chapter

More information

Testing Hereditary Properties of Non-Expanding Bounded-Degree Graphs

Testing Hereditary Properties of Non-Expanding Bounded-Degree Graphs Testing Hereditary Properties of Non-Expanding Bounded-Degree Graphs Artur Czumaj Asaf Shapira Christian Sohler Abstract We study graph properties which are testable for bounded degree graphs in time independent

More information

The New Prehistory. 1 This is an updated version of the chapter with this title that appeared on pages 359 376 of Optimization Stories,

The New Prehistory. 1 This is an updated version of the chapter with this title that appeared on pages 359 376 of Optimization Stories, A Brief History of NP-Completeness, 1954 2012 David S. Johnson Mathematics subject classification: 68-03, 68Q17, 68Q25, 68W25, 90C05, 90C22 Key words: NP-Completeness, Polynomial Time, Approximation Algorithms,

More information

Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students

Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students Eastern Washington University Department of Computer Science Questionnaire for Prospective Masters in Computer Science Students I. Personal Information Name: Last First M.I. Mailing Address: Permanent

More information

A Secure and Efficient Conference Key Distribution System

A Secure and Efficient Conference Key Distribution System ********************** COVER PAGE ********************** A Secure and Efficient Conference Key Distribution System (Extended Abstract) Mike Burmester Department of Mathematics Royal Holloway University

More information

Matthias F.M. Stallmann Department of Computer Science North Carolina State University Raleigh, NC 27695-8206

Matthias F.M. Stallmann Department of Computer Science North Carolina State University Raleigh, NC 27695-8206 Matthias F.M. Stallmann Department of Computer Science North Carolina State University Raleigh, NC 27695-8206 August, 1990 UNIFORM PLANAR EMBEDDING IS NP-COMPLETE* MATTHIAS F.M. STALLMANN Key Words. planar

More information

Introduction to computer science

Introduction to computer science Introduction to computer science Michael A. Nielsen University of Queensland Goals: 1. Introduce the notion of the computational complexity of a problem, and define the major computational complexity classes.

More information

The `Russian Roulette' problem: a probabilistic variant of the Josephus Problem

The `Russian Roulette' problem: a probabilistic variant of the Josephus Problem The `Russian Roulette' problem: a probabilistic variant of the Josephus Problem Joshua Brulé 2013 May 2 1 Introduction The classic Josephus problem describes n people arranged in a circle, such that every

More information

Olaf Beyersdorff. International Computer Science Symposium in Russia 2006

Olaf Beyersdorff. International Computer Science Symposium in Russia 2006 Institute of Computer Science Humboldt-University Berlin Germany Tuples from Proof Optimal Proof International Computer Science Symposium in Russia 2006 Disjoint NP-Pairs (Grollmann, Selman 88) (A, B)

More information

Course Manual Automata & Complexity 2015

Course Manual Automata & Complexity 2015 Course Manual Automata & Complexity 2015 Course code: Course homepage: Coordinator: Teachers lectures: Teacher exercise classes: Credits: X_401049 http://www.cs.vu.nl/~tcs/ac prof. dr. W.J. Fokkink home:

More information

Introduction to Logic in Computer Science: Autumn 2006

Introduction to Logic in Computer Science: Autumn 2006 Introduction to Logic in Computer Science: Autumn 2006 Ulle Endriss Institute for Logic, Language and Computation University of Amsterdam Ulle Endriss 1 Plan for Today Now that we have a basic understanding

More information

Copyright by Alexander Alexandrovich Sherstov 2009

Copyright by Alexander Alexandrovich Sherstov 2009 Copyright by Alexander Alexandrovich Sherstov 2009 The Dissertation Committee for Alexander Alexandrovich Sherstov certifies that this is the approved version of the following dissertation: Lower Bounds

More information

Decentralized Utility-based Sensor Network Design

Decentralized Utility-based Sensor Network Design Decentralized Utility-based Sensor Network Design Narayanan Sadagopan and Bhaskar Krishnamachari University of Southern California, Los Angeles, CA 90089-0781, USA narayans@cs.usc.edu, bkrishna@usc.edu

More information

Computational Complexity: A Modern Approach. Draft of a book: Dated January 2007 Comments welcome!

Computational Complexity: A Modern Approach. Draft of a book: Dated January 2007 Comments welcome! i Computational Complexity: A Modern Approach Draft of a book: Dated January 2007 Comments welcome! Sanjeev Arora and Boaz Barak Princeton University complexitybook@gmail.com Not to be reproduced or distributed

More information

Generating models of a matched formula with a polynomial delay

Generating models of a matched formula with a polynomial delay Generating models of a matched formula with a polynomial delay Petr Savicky Institute of Computer Science, Academy of Sciences of Czech Republic, Pod Vodárenskou Věží 2, 182 07 Praha 8, Czech Republic

More information

NP-Completeness and Cook s Theorem

NP-Completeness and Cook s Theorem NP-Completeness and Cook s Theorem Lecture notes for COM3412 Logic and Computation 15th January 2002 1 NP decision problems The decision problem D L for a formal language L Σ is the computational task:

More information

Tutorial 8. NP-Complete Problems

Tutorial 8. NP-Complete Problems Tutorial 8 NP-Complete Problems Decision Problem Statement of a decision problem Part 1: instance description defining the input Part 2: question stating the actual yesor-no question A decision problem

More information

NP-complete? NP-hard? Some Foundations of Complexity. Prof. Sven Hartmann Clausthal University of Technology Department of Informatics

NP-complete? NP-hard? Some Foundations of Complexity. Prof. Sven Hartmann Clausthal University of Technology Department of Informatics NP-complete? NP-hard? Some Foundations of Complexity Prof. Sven Hartmann Clausthal University of Technology Department of Informatics Tractability of Problems Some problems are undecidable: no computer

More information

The Challenger-Solver game: Variations on the theme of P =?NP

The Challenger-Solver game: Variations on the theme of P =?NP The Challenger-Solver game: Variations on the theme of P =?NP Yuri Gurevich Electrical Engineering and Computer Science Department University of Michigan, Ann Arbor, MI 48109, U.S.A. Logic in Computer

More information

2. (a) Explain the strassen s matrix multiplication. (b) Write deletion algorithm, of Binary search tree. [8+8]

2. (a) Explain the strassen s matrix multiplication. (b) Write deletion algorithm, of Binary search tree. [8+8] Code No: R05220502 Set No. 1 1. (a) Describe the performance analysis in detail. (b) Show that f 1 (n)+f 2 (n) = 0(max(g 1 (n), g 2 (n)) where f 1 (n) = 0(g 1 (n)) and f 2 (n) = 0(g 2 (n)). [8+8] 2. (a)

More information

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Yong Zhang 1.2, Francis Y.L. Chin 2, and Hing-Fung Ting 2 1 College of Mathematics and Computer Science, Hebei University,

More information

Query Order and NP-Completeness 1 Jack J.Dai Department of Mathematics Iowa State University Ames, Iowa 50011 U.S.A. Jack H.Lutz Department of Computer Science Iowa State University Ames, Iowa 50011 U.S.A.

More information

An Overview of Common Adversary Models

An Overview of Common Adversary Models An Overview of Common Adversary Karl Palmskog palmskog@kth.se 2012-03-29 Introduction Requirements of Software Systems 1 Functional Correctness: partial, termination, liveness, safety,... 2 Nonfunctional

More information

Notes on Complexity Theory Last updated: August, 2011. Lecture 1

Notes on Complexity Theory Last updated: August, 2011. Lecture 1 Notes on Complexity Theory Last updated: August, 2011 Jonathan Katz Lecture 1 1 Turing Machines I assume that most students have encountered Turing machines before. (Students who have not may want to look

More information

Lecture 1: Course overview, circuits, and formulas

Lecture 1: Course overview, circuits, and formulas Lecture 1: Course overview, circuits, and formulas Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: John Kim, Ben Lund 1 Course Information Swastik

More information

The Complexity of Generating and Checing Proofs of Membership Harry Buhrman CWI Amsterdam Thomas Thierauf y Universitat Ulm Abstract We consider the following questions: 1) Can one compute satisfying assignments

More information

SECRET sharing schemes were introduced by Blakley [5]

SECRET sharing schemes were introduced by Blakley [5] 206 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 1, JANUARY 2006 Secret Sharing Schemes From Three Classes of Linear Codes Jin Yuan Cunsheng Ding, Senior Member, IEEE Abstract Secret sharing has

More information

Competitive Analysis of On line Randomized Call Control in Cellular Networks

Competitive Analysis of On line Randomized Call Control in Cellular Networks Competitive Analysis of On line Randomized Call Control in Cellular Networks Ioannis Caragiannis Christos Kaklamanis Evi Papaioannou Abstract In this paper we address an important communication issue arising

More information

Limits of Computational Differential Privacy in the Client/Server Setting

Limits of Computational Differential Privacy in the Client/Server Setting Limits of Computational Differential Privacy in the Client/Server Setting Adam Groce, Jonathan Katz, and Arkady Yerukhimovich Dept. of Computer Science University of Maryland {agroce, jkatz, arkady}@cs.umd.edu

More information

Definition 11.1. Given a graph G on n vertices, we define the following quantities:

Definition 11.1. Given a graph G on n vertices, we define the following quantities: Lecture 11 The Lovász ϑ Function 11.1 Perfect graphs We begin with some background on perfect graphs. graphs. First, we define some quantities on Definition 11.1. Given a graph G on n vertices, we define

More information

The Complexity of Online Memory Checking

The Complexity of Online Memory Checking The Complexity of Online Memory Checking Moni Naor Guy N. Rothblum Abstract We consider the problem of storing a large file on a remote and unreliable server. To verify that the file has not been corrupted,

More information

Exponential time algorithms for graph coloring

Exponential time algorithms for graph coloring Exponential time algorithms for graph coloring Uriel Feige Lecture notes, March 14, 2011 1 Introduction Let [n] denote the set {1,..., k}. A k-labeling of vertices of a graph G(V, E) is a function V [k].

More information

CNFSAT: Predictive Models, Dimensional Reduction, and Phase Transition

CNFSAT: Predictive Models, Dimensional Reduction, and Phase Transition CNFSAT: Predictive Models, Dimensional Reduction, and Phase Transition Neil P. Slagle College of Computing Georgia Institute of Technology Atlanta, GA npslagle@gatech.edu Abstract CNFSAT embodies the P

More information

Rustam Mubarakzjanov z. Abstract. We investigate the relationship between probabilistic and nondeterministic complexity

Rustam Mubarakzjanov z. Abstract. We investigate the relationship between probabilistic and nondeterministic complexity On BPP versus NP[coNP for Ordered Read-Once Branching Programs Farid Ablayev Marek Karpinski y Rustam Mubarakzjanov z Abstract We investigate the relationship between probabilistic and nondeterministic

More information

Extracting Kolmogorov Complexity with Applications to Dimension Zero-One Laws

Extracting Kolmogorov Complexity with Applications to Dimension Zero-One Laws Extracting Kolmogorov Complexity with Applications to Dimension Zero-One Laws Lance Fortnow Department of Computer Science University of Chicago fortnow@cs.uchicago.edu A. Pavan Department of Computer

More information

Cycle transversals in bounded degree graphs

Cycle transversals in bounded degree graphs Electronic Notes in Discrete Mathematics 35 (2009) 189 195 www.elsevier.com/locate/endm Cycle transversals in bounded degree graphs M. Groshaus a,2,3 P. Hell b,3 S. Klein c,1,3 L. T. Nogueira d,1,3 F.

More information

Computational Soundness of Symbolic Security and Implicit Complexity

Computational Soundness of Symbolic Security and Implicit Complexity Computational Soundness of Symbolic Security and Implicit Complexity Bruce Kapron Computer Science Department University of Victoria Victoria, British Columbia NII Shonan Meeting, November 3-7, 2013 Overview

More information